6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
7.9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
Multiple improper input validation flaws were identified in some CLI commands of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to cause a buffer overflow or a system crash via a crafted payload.
[
{
"vendor": "Zyxel",
"product": "USG/ZyWALL series firmware",
"versions": [
{
"version": "4.09 through 4.71",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "USG FLEX series firmware",
"versions": [
{
"version": "4.50 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "ATP series firmware",
"versions": [
{
"version": "4.32 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "VPN series firmware",
"versions": [
{
"version": "4.30 through 5.21",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NSG series firmware",
"versions": [
{
"version": "1.00 through 1.33 Patch 4",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NXC2500 firmware",
"versions": [
{
"version": "<= 6.10(AAIG.3)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NAP203 firmware",
"versions": [
{
"version": "<= 6.25(ABFA.7)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "NWA50AX firmware",
"versions": [
{
"version": "<= 6.25(ABYW.5)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "WAC500 firmware",
"versions": [
{
"version": "<= 6.30(ABVS.2)",
"status": "affected"
}
]
},
{
"vendor": "Zyxel",
"product": "WAX510D firmware",
"versions": [
{
"version": "<= 6.30(ABTF.2)",
"status": "affected"
}
]
}
]
packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html
seclists.org/fulldisclosure/2022/Jun/15
www.zyxel.com/support/multiple-vulnerabilities-of-firewalls-AP-controllers-and-APs.shtml
6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
7.9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%